If your organization's got a lot riding on the continued security of its
confidential or proprietary data, then you need to stay informed on the
threats and how to address them. One of the most worrying threats of late,
especially when it comes to cloud data security, is government spying - both
foreign and domestic.
Foreign spying and corporate and economic espionage are, of course, not new
concepts, but the enterprise's increasing reliance on the Internet and cloud
computing make them more of a concern than ever before. Just this week, the
Wall Street Journal reported that the U.S. Justice Department has indicted
five officers of the Chinese military on charges that they "hacked U.S.
companies' computers to steal trade secrets" from firms including U.S. Steel
Corp. and Westinghouse Electric Co. Wang Dong, Gu Chunhui, Sun Kailiang,
Huang Zhenyu, and Wen Xinyu are ... (more)
Cloud computing brings a myriad of benefits for any enterprise, but it is
also a cause for concern in a world where, according to InformationWeek,
cyber criminals are now targeting "any company where they can find data to
resell, disrupt or exploit."
Moving your company's sensitive data into the hands of third-party cloud
providers expands and complicates the risk landscape in which you operate
In order to understand what concerns should be given emphasis in your cloud
security strategy, you need to understand what you can't afford to lose and
what can protect you.
In many industries, cloud computing is now vital to remaining competitive.
The cloud typically offers superior flexibility, scalability, accessibility,
and high availability, enabling businesses to grow more agile and responsive.
Regulatory compliance concerns often make banks and other financial service
providers slower to adopt the cloud, but even in the financial services
industry, the cloud will soon become a necessity.
Banks are already seeing attractive use cases for cloud computing, as Bank
Systems & Technology's Bryan Yurcan and Jonathan Camhi pointed out late last
Cloud computing security can be a conundrum. The point of using the public
cloud is to outsource certain infrastructure and application needs to third
party providers, after all. How can you secure your data once it leaves your
perimeter and your control? As puzzling as it may seem, there is hope.
Luckily for organizations looking to adopt the cloud, securing sensitive
information outside the corporate perimeter isn't as daunting (or as
impossible) as it may appear. Technologies exist to enable cloud computing
security strong enough for companies to remain in compliance while taki... (more)
For some organizations, cloud computing can be a hard sell, even before you
come to the question of how to handle cloud-computing security. Public cloud,
private cloud, hybrid cloud, encryption, tokenization, data residency,
privacy regulations - all are factors involved and the perceived effort can
sometimes seem to overshadow the benefits. But just as cloud computing comes
with a slew of demonstrated business benefits, so does effective cloud
computing security. Included below are three specific benefits to
implementing a cloud computing security system.
1. Regulatory complia... (more)